coturn
wg-easy
Our great sponsors
coturn | wg-easy | |
---|---|---|
25 | 20 | |
10,449 | 11,511 | |
1.9% | 6.6% | |
8.6 | 9.8 | |
5 days ago | 1 day ago | |
C | JavaScript | |
GNU General Public License v3.0 or later | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
coturn
-
Golang WebRTC. How to use Pion 🌐Remote Controller
Both TURN and STUN can be self hosted, the most popular project i have found is coturn
-
How to setup and configure TURN server using coTURN?
# TURN server name and realm realm=DOMAIN server-name=turnserver # Use fingerprint in TURN message fingerprint # IPs the TURN server listens to listening-ip=0.0.0.0 # External IP-Address of the TURN server external-ip=IP_ADDRESS # Main listening port listening-port=3478 # Further ports that are open for communication min-port=10000 max-port=20000 # Log file path log-file=/var/log/turnserver.log # Enable verbose logging verbose # Specify the user for the TURN authentification user=turnuser:turn456 # Enable long-term credential mechanism lt-cred-mech # If running coturn version older than 4.5.2, uncomment these rules and ensure # that you have listening-ip set to ipv4 addresses only. # Prevent Loopback bypass https://github.com/coturn/coturn/security/advisories/GHSA-6g6j-r9rf-cm7p #denied-peer-ip=0.0.0.0-0.255.255.255 #denied-peer-ip=127.0.0.0-127.255.255.255 #denied-peer-ip=::1
-
How to deploy TURN server(coturn) inside Kubernetes
I am trying to deploy coturn server in the Kubernetes cluster.
-
SIM card at home
That is an excellent use case for a webrtc server rather than an usual voice communication. If you decide to go that way, you don't need any sim card. You just need an internet access. You install a webrtc client (the usual one is coturn). I don't know if you also need to set up some kind of chat server in addition.
-
Nextcloud-AIO Backup error
I've found this issue for you: https://github.com/coturn/coturn/issues/492
-
Matrix 2.0: How we’re making Matrix go voom
If you host yourself on a VPS you can hook in coturn (it's enabled by the linked playbook by default):
https://github.com/spantaleev/matrix-docker-ansible-deploy/b...
-
WebRTC for p2p voice calling app?
You're welcome! If this is for mission-critical or commercial use, you will want to invest in a good TURN server to ensure a reliable connection between peers. You can either self-host your own Coturn server or pay for a service like Twilio. But if this is just a hobby project, you can just use the free Open Relay Project.
-
[coTurn] Add TURN users into a database
schema.sql - coturn - GitHub
-
[Xubuntu22.04] Try coTurn for WebRTC 1
I tried http://turnserver.open-sys.org/ and cloning the GitHub repository, but I got the same results.
-
NetBird - Open Source P2P overlay network with WireGuard, WebRTC, SSO, blackjack, and Zero Trust
NetBird and Netmaker are similar in their capabilities and mesh offering, the same goes for Tailscale, but if we compare technical implementations, Netbird relies on the ICE and STUN protocols to discover the best path for p2p connectivity between peers. These are open WebRTC protocols with battle-tested software around them. Similarly, we use TURN for securely relaying traffic, when a p2p connection isn't possible (hard NAT). This protocol also comes from the WebRTC world and has stable and popular implementations like Coturn.
wg-easy
-
PiHole after wireguard install?
Check out wg-easy on GitHub. There is also a wg with pinole on their page. Works so easily together. https://github.com/wg-easy/wg-easy
-
Alternative to Headscale?
sounds like you just want wg-easy.
-
WireHole is a combination of WireGuard, Pi-hole, and Unbound
This wg-easy?
Definitely not an OSI approved license, but does look like they made an attempt in the spirit of GPL, no?
https://github.com/wg-easy/wg-easy/blob/master/LICENSE.md
> You may:
Use this software for yourself;
Use this software for a company;
Modify this software, as long as you:
Publish the changes on GitHub as an open-source & linked fork;
Don't remove any links to the original project or donation pages;
You may not:
Use this software in a commercial product without a license from the original author;
- The Tailscale Universal Docker Mod
-
Who do you use for port forwarding?
wg-easy running in Docker. Then access it using WireGuard on my mobile devices.
-
Netmaker/Tailscale Vs Traditional VPNs
Just plain wg-easy (wireguard with frontend). No 3rd parties involved, just me & my endpoint
-
Is it possible to make a phone connect to a server without having to open any ports on the server side ?
I suggest running a VPN server like wireguard (very easy to install on phone and set up using https://github.com/wg-easy/wg-easy) and have the port open only to that. The VPN will do the rest in terms of NATing ports and whatnot.
- Which is more of a pain in the ass: connecting to databases via SSH tunnels, or whitelisting IP addresses?
-
Self-Hosted Mesh Network / VPN For User-Friendly LAN Gaming Network?
https://github.com/wg-easy/wg-easy (7.6k stars)
-
Changing Private IP to domain or something locally for selfhosted RSS-Bridge?
I use wg-easy for now https://github.com/wg-easy/wg-easy
What are some alternatives?
peerjs - Simple peer-to-peer with WebRTC.
wireguard-ui - Wireguard web interface
stunner - A Kubernetes media gateway for WebRTC. Contact: [email protected]
pivpn - The Simplest VPN installer, designed for Raspberry Pi
ice - A Go implementation of ICE
firezone - Open-source VPN server and egress firewall for Linux built on WireGuard. Firezone is easy to set up (all dependencies are bundled thanks to Chef Omnibus), secure, performant, and self hostable.
awesome-compose - Awesome Docker Compose samples
wg-manager - A easy to use WireGuard dashboard and management tool
netbird - Connect your devices into a single secure private WireGuard®-based mesh network with SSO/MFA and simple access controls.
wg-gen-web - Simple Web based configuration generator for WireGuard
Remotely - A remote control and remote scripting solution, built with .NET 8, Blazor, and SignalR.
WGDashboard - Simplest dashboard for WireGuard VPN written in Python w/ Flask